Overview
- Description
- An insecure modification flaw in the /etc/kubernetes/kubeconfig file was found in OpenShift. This flaw allows an attacker with access to a running container which mounts /etc/kubernetes or has local access to the node, to copy this kubeconfig file and attempt to add their own node to the OpenShift cluster. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects versions before openshift4/ose-machine-config-operator v4.7.0-202105111858.p0.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- secalert@redhat.com
- CWE-266
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC917AC2-DD18-4DD6-80B4-4A1BE1A62D10", "versionEndExcluding": "4.7.0" }, { "criteria": "cpe:2.3:a:redhat:openshift:4.7.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D5A79FB-491F-4030-8F6F-C3691F9D7D58" } ], "operator": "OR" } ] } ]